In the domain of automatic speaker verification, one of the challenges is to keep the malevolent people out of the system. One way to do this is to create algorithms that are supposed to detect spoofed speech. There are several types of spoofed speech and several ways to detect them, one of which is to look at the glottal flow waveform (GFW) of a speech signal. This waveform is often estimated using glottal inverse filtering (GIF), since, in order to create the ground truth GFW, special invasive equipment is required. To the author’s knowledge, no research has been done where the correlation of GFW accuracy and spoofed speech detection (SSD) performance is investigated. This thesis tries to find out if the aforementioned correlation ...
Speech consists of voiced and unvoiced segments that differ in their production process and exhibit ...
Modern advancements in text to speech and voice conversion techniques make it increasingly difficult...
Automatic speaker verification (ASV) systems are highly vul-nerable against spoofing attacks, also k...
In the domain of automatic speaker verification, one of the challenges is to keep the malevolent pe...
International audienceIn the context of detection of speaker recognition identity impersonation , we...
Glottal inverse filtering (GIF) refers to technology to estimate the source of voiced speech, the gl...
How well do humans detect spoofing attacks directed at au-tomatic speaker verification systems? This...
An automatic speaker verification (ASV) is one of the challenging problem in speech processing since...
Glottal volume velocity waveform, the acoustical excitation of voiced speech, cannot be acquired thr...
Even though improvements in the speaker verification (SV) technology with i-vectors increased their ...
With the rapid development of intelligent speech technologies, automatic speaker verification (ASV) ...
The flow of air through the glottis, the glottal volume-velocity, reflects the action of the vocal f...
Abstract: Source-tract decomposition (or glottal flow estimation) is one of the basic problems of sp...
Automatic speaker verification (ASV) systems are highly vul-nerable against spoofing attacks, also k...
Similar to other biometric systems, speaker verification systems are easy to be affected by various ...
Speech consists of voiced and unvoiced segments that differ in their production process and exhibit ...
Modern advancements in text to speech and voice conversion techniques make it increasingly difficult...
Automatic speaker verification (ASV) systems are highly vul-nerable against spoofing attacks, also k...
In the domain of automatic speaker verification, one of the challenges is to keep the malevolent pe...
International audienceIn the context of detection of speaker recognition identity impersonation , we...
Glottal inverse filtering (GIF) refers to technology to estimate the source of voiced speech, the gl...
How well do humans detect spoofing attacks directed at au-tomatic speaker verification systems? This...
An automatic speaker verification (ASV) is one of the challenging problem in speech processing since...
Glottal volume velocity waveform, the acoustical excitation of voiced speech, cannot be acquired thr...
Even though improvements in the speaker verification (SV) technology with i-vectors increased their ...
With the rapid development of intelligent speech technologies, automatic speaker verification (ASV) ...
The flow of air through the glottis, the glottal volume-velocity, reflects the action of the vocal f...
Abstract: Source-tract decomposition (or glottal flow estimation) is one of the basic problems of sp...
Automatic speaker verification (ASV) systems are highly vul-nerable against spoofing attacks, also k...
Similar to other biometric systems, speaker verification systems are easy to be affected by various ...
Speech consists of voiced and unvoiced segments that differ in their production process and exhibit ...
Modern advancements in text to speech and voice conversion techniques make it increasingly difficult...
Automatic speaker verification (ASV) systems are highly vul-nerable against spoofing attacks, also k...